Help
RSS
API
Feed
Maltego
Contact
Domain > backoffice.directcharge.de
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2024-04-12
52.57.215.186
(
ClassC
)
2024-05-03
18.157.135.52
(
ClassC
)
2024-08-12
52.29.107.91
(
ClassC
)
2024-08-17
18.196.78.130
(
ClassC
)
2024-12-26
3.73.90.58
(
ClassC
)
2025-01-27
18.196.230.124
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: awselb/2.0Date: Fri, 12 Apr 2024 11:56:19 GMTContent-Type: text/htmlContent-Length: 134Connection: keep-aliveLocation: https://backoffice.directcharge.de:443/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 12 Apr 2024 11:56:20 GMTContent-Type: text/htmlContent-Length: 6719Connection: keep-aliveServer: KestrelAccept-Ranges: bytesETag: 1d9f524d7a9ccbfLast-Modified: Mon, 02 Oct 20 !DOCTYPE html>html langen> head> meta charsetUTF-8 /> meta nametheme-color content#1AA62D /> meta http-equivX-UA-Compatible contentIEedge /> meta namekeywords contentDirectCharge,BackOffice /> meta namedescription contentA comprehensive management solution for DirectCharge-affiliated charging network operators. /> meta nameviewport contentwidthdevice-width, initial-scale1.0, maximum-scale1.0, user-scalable0 /> title>DirectCharge BackOffice/title> link relicon href/favicon.svg typeimage/x-icon /> link relapple-touch-icon href/icons/icon-192x192.png /> link relmanifest href/manifest.json crossoriginuse-credentials /> link relstylesheet href/umi.8f3c57e9.css /> script> window.routerBase /; /script> script> //! umi version: 3.5.20 /script> /head> body> noscript> div classnoscript-container> It looks like Javascript is disabled in this browser. Please div classnoscript-enableJS> a hrefhttps://www.enablejavascript.io/en target_blank relnoopener noreferrer > b>enable Javascript/b> /a> /div> to use DirectCharge BackOffice. /div> /noscript> div idroot> style> html, body, #root { height: 100%; margin: 0; padding: 0; } #root { background-repeat: no-repeat; background-size: 100% auto; } .noscript-container { display: flex; align-content: center; justify-content: center; margin-top: 90px; font-size: 20px; font-family: Lucida Sans, Lucida Sans Regular, Lucida Grande, Lucida Sans Unicode, Geneva, Verdana, sans-serif; } .noscript-enableJS { padding-right: 3px; padding-left: 3px; } .page-loading-warp { display: flex; align-items: center; justify-content: center; padding: 98px; }
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]